Evidence of meeting #42 for Access to Information, Privacy and Ethics in the 42nd Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was scisa.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

Laura Tribe  Executive Director, OpenMedia
David Elder  Executive Member, Privacy and Access Law Section, Canadian Bar Association
David Fraser  Partner, McInnes Cooper, As an Individual

4:25 p.m.

Conservative

The Chair Conservative Blaine Calkins

Thank you.

Ms. Tribe, you wanted to add something.

4:25 p.m.

Executive Director, OpenMedia

Laura Tribe

Yes. I agree it's a huge concern, but there were very weak protections for Canadians' data that went cross-border to the U.S. in the first place. Some of the problems with that executive order actually have to do with data transmitted through the Internet that the NSA would intercept itself. It wasn't necessarily given from the Canadian government.

I think there's a much bigger question around how we work with our partners to ensure that our data and our citizens' data is protected, as well as those agreements we make up front. If we're going to enter into information sharing, what are the provisions that we need and the guarantees for our own citizens?

4:25 p.m.

Conservative

The Chair Conservative Blaine Calkins

Thank you very much.

We now go to Mr. Saini for the last of the seven-minute round.

4:25 p.m.

Liberal

Raj Saini Liberal Kitchener Centre, ON

I wanted to pick up on that point of information sharing, especially with the concept that Mr. Elder raised about subsequent disclosure.

We've raised the issue about the Five Eyes. We may have bilateral agreements with certain countries about information sharing. We may even have agreements with multilateral organizations like the Five Eyes. The question I have is, what recommendation can we make for the situation that occurs if we pass on information to one of our multilateral partners with whom we have a solid agreement, but that country or that entity has an agreement with a third country that we may not have a direct contact with?

On our part with the recipient country, we have a very strict and a very coherent protocol governing how to share information. What happens if that country has an agreement with another country that we do not have an agreement with? How do we protect that information from being sent over? How would you guide us? What kind of recommendation should we make?

4:30 p.m.

Partner, McInnes Cooper, As an Individual

David Fraser

I would suggest it's exactly as Mr. Elder referred to. It's a matter of trusting. You're going to have to trust. If you're going to enter into these bilateral or multilateral information-sharing arrangements, you're going to have to trust.

We can also put in place general limitations on what kind of information we share. What is the nature of the information we share? Also—and this is one of the things that might sound a little bit repetitive—what's the magnitude of the information we share? If the RCMP receives a query from the Department of Homeland Security regarding an individual that they have under investigation, that's a very different thing than giving the FBI full access to the Canadian Police Information Centre, which is currently the case. They're allowed almost unsupervised access to a massive trove of data. We don't have a whole lot of insight, accountability, or oversight, or even an understanding of what is happening with that information.

If it's on a case-by-case basis so that it's much more limited or it's much more controlled, then you have a much better sense of why they're asking. What's the nature of the information? Is it particularly sensitive? Is it something that's stigmatizing? Does it relate to, for example, religion or protected expression under our charter or all these other sorts of things? Shared databases and massive troves of information seem to be the trend these days. Instead of using knowledgeable investigative insight and individuals with the proper skills, they're throwing in technology, collecting a lot of information to create a haystack as big as they can, and then using technology to go through it looking for needles.

The problem is that the haystack is information about individuals who are 99.999% innocent. Technological scanning, for example, will produce false positives, will result in individuals wrongly ending up on no-fly lists and other things, or worse, ending up being tortured in a basement somewhere. That's what we need to protect. You don't share sensitive information that could cause harm to our citizens with somebody that you don't absolutely trust in terms of what's going to happen with that information.

Unfortunately, as Mr. Elder said, no Canadian law can tie the hands of any foreign government once they have that information. It needs to be a two-way street. It needs to be a relationship built on trust, but trust that's verified. Keep an eye on their track record. Has the information gone elsewhere? Be prepared to kind of pull back on the leash if there's any sign of trouble.

4:30 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

Just to add to that, I certainly think our treaty arrangements and mutual sharing agreements with foreign governments can attempt to limit what those foreign states do subsequently with the information they receive from us, specifically preventing them, for example, from disclosing information they got from us to other states without our okay, or things like that.

The only remedy we would have when those arrangements aren't followed is to pull back on future sharing, or maybe there are other diplomatic channels and consequences to that relationship. Those are really the only things we can do if things go off the rails.

4:30 p.m.

Liberal

Raj Saini Liberal Kitchener Centre, ON

If a country had to share that information with a third country, would you suggest that maybe a separate request be sent to the department, stating that a third country needed certain information and stating the reasons? That department here would make another analysis or another decision as to whether the information should be shared or not. Would that be something you think would be prudent?

4:35 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

I certainly think that is a mechanism that might help. I think, as a country, we wouldn't want information shared indirectly with countries that we wouldn't otherwise have shared with directly.

4:35 p.m.

Liberal

Raj Saini Liberal Kitchener Centre, ON

The second point I want to raise, and this is part of your CBA submission, is that some of the departments that are mentioned under SCISA have the power to compel, to receive information.

What could happen—and this is where I want guidance, advice, or recommendations from all three of you—is that if you have one department that has the ability to compel information through a warrant or something else, they receive that information, and then another department that does not have that ability would ask for that information and receive it. That department would be receiving that information indirectly, as opposed to receiving it directly like the other department.

What advice would you have to make sure that this information is handled in a suitable manner?

4:35 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

I guess there are two thoughts on the subject, and thank you for the question, because it is something we didn't address maybe as explicitly as we should have in the position paper.

I don't think that CBA was ever considering a situation in which another department would ask for it. I would say that right from the get-go, there should be a restriction on that. If you're a department asking another institution for information that they've obtained through extraordinary powers, I don't think that should be permitted.

I think our comment was more on the other scenario, in which the institution that has those powers gets information that they believe would be relevant to another institution. Our submission was that the information should only be handed over to that other institution if it's very clearly necessary to allow that other institution to fulfill its functions that relate specifically to national security.

4:35 p.m.

Partner, McInnes Cooper, As an Individual

David Fraser

I think it's a very interesting question. It raises the spectre that I didn't even think of as well, which is essentially information laundering. I'm actually a little ashamed, because I'm usually pretty good at worst-case scenarios.

In an example like this you could—I don't know, but maybe this is one of those movie plot theories—imagine a scenario in which, for example, CSIS goes to the RCMP and says they would like to have all the recordings the RCMP have made of communications they intercepted with a warrant. Now, the RCMP can't make collateral use of that, likely because of the conditions in the warrant. However, as soon as CSIS has it, which they can do under SCISA, they're not subject to those restrictions; they're subject to their own kind of restrictions.

You could, in fact, by moving information from one department to another—which is completely allowed under this—change the nature of the protection of that information or lift those protections. That section 9 that I referred to would remove any civil liability for doing that, and that could be troubling.

Yes, I'm going to lose sleep over that.

4:35 p.m.

Conservative

The Chair Conservative Blaine Calkins

All right. We'll get on with the meeting, then, so that we can get to bed earlier.

Go ahead, Mr. Kelly.

January 31st, 2017 / 4:35 p.m.

Conservative

Pat Kelly Conservative Calgary Rocky Ridge, AB

Thank you.

I'd like to continue with you, Mr. Fraser, and maybe get some further clarification of what you discussed in your opening remarks, and maybe even in your answer to Mr. Saini's question.

You've characterized SCISA as a blank cheque facilitating the collection of bulk data and the exchange of bulk data, seemingly without any limitation. We've had a lot of discussion about the correct threshold for information sharing, and the criticism of SCISA that many have raised is that conduct that undermines the security of Canada is too low a threshold and that the bar ought to be set higher. It is, nevertheless, a bar.

You gave hypothetical scenarios in which people's charitable donations to religious communities were combined with who visits prisons and who crosses borders. None of that sounds like anything that would meet the stated threshold of undermining the security of Canada. Explain how SCISA, with such a threshold built into it—whether too high or too low, it is, nevertheless, a threshold—really is this sort of blank cheque to collect any and all data in bulk and to transmit it to any of these 17 organizations.

4:40 p.m.

Partner, McInnes Cooper, As an Individual

David Fraser

I'm happy to answer that.

Part of it relates to the question of relevance: what is relevant to investigations related to activities that undermine the security of Canada? Relevance is a very low threshold. If you're going to tinker with it, I would adopt “necessary”, because that's stricter.

Another problem is going to be that there's no oversight. There's no mechanism by which you can test whether or not something is, in fact, reasonable; reasonable is in the eye of the beholder.

Then also, we're now in the 21st century, when investigative means aren't simply following up leads but are analyzing databases and taking massive amounts of information and running them against algorithms in order to try to make information surface. If you are investigating to try to find the next person who's going to commit murder in a mosque, for example, if you have the mindset that the best way to do that is to analyze massive data sets because doing that is relevant to dealing with situations that would undermine the security of Canada, you can justify that in that sort of circumstance. When your mindset is that you operate by analyzing bulk data sets, then you can very easily see and connect those dots and take something that way. It might not have been the intention, but in this day and age, that is how a lot of investigations and a lot of intelligence work are being done, so we need to have the limitations that are in it.

As I said, I'd be happy to have the whole thing thrown out and rewritten and to have these things dealt with in the Privacy Act. The four recommendations made by the Canadian Bar Association would dramatically improve it, but we need to have the proportionality in it. It's the use of bulk data that troubles me the most.

4:40 p.m.

Conservative

Pat Kelly Conservative Calgary Rocky Ridge, AB

I understand that two of you have quite clearly recommended scrapping it. I'll ask a question that may be aimed more at tweaking than scrapping.

Mr. Elder, how do you think oversight would work? The commissioner's recommendation is for independent oversight for all government bodies that receive information under SCISA. What do you think that would look like? Comment on the cost and manageability of workload. What would a proper body to oversee the listed recipients look like if we were to continue to have an information-sharing system similar to SCISA?

4:40 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

Well, I can say we haven't done a full budgeting workup of what that would look like or those costs, so I'm not in a position to tell you today that it's going to require so many employees or that there's going to be an annual budget.

What I can say is that I think for that to work, a couple of things have to happen. One, as we said in our submission, is that it's really important that the institutions involved in information sharing—both those disclosing and those receiving—have to keep records of what's going on. I think it would be desirable for there to be some kind of regular reporting function between those institutions and whatever governing body or oversight body is created. I think it makes sense that the oversight body would have powers to investigate and compel production of information, potentially audit-like powers.

That's probably all I'll offer you at the moment. I'm sorry I don't have further information.

4:40 p.m.

Conservative

The Chair Conservative Blaine Calkins

Thank you very much, Mr. Kelly.

We'll go to a five-minute round now, beginning with Mr. Dubourg.

4:40 p.m.

Liberal

Emmanuel Dubourg Liberal Bourassa, QC

Thank you very much, Mr. Chair.

This is the first time I've been on the Standing Committee on Access to Information, Privacy and Ethics. Let me salute the members of the committee and tell them that I'm very pleased to be here and to work with them. I also acknowledge the witnesses who are here with us. My apologies for being late for the meeting.

I'm very interested in this topic, so I have a number of questions that I would like to just throw at several of you.

My first question is for you, Mr. Elder.

I looked at the brief that was submitted. Schedule 3 of the Security of Canada Information Sharing Act lists 17 federal institutions that are authorized to exchange information. Pursuant to which section of the legislation, should we allow the information sharing between those institutions? In your view, are there too many authorized institutions? Can you also tell me which aspect of national security comes into play for each institution? What do you suggest that we correct to ensure that only the institutions mandated to receive that type of information are authorized to do so?

4:45 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

Thank you very much for your questions.

To your first question, on whether there are too many, I think part of the issue is that we don't really know. That's because for a number of these listed institutions, it's not obvious—to me, anyway—exactly what their responsibilities and authorities that relate to national security are. For some of them it's a bit more obvious; for some of them it's not obvious at all.

That's exactly why we recommended that as part of this you not only identify the institution but you also explicitly identify the sections of their legislative mandate that would clearly relate to some authority over the protection of national security.

4:45 p.m.

Liberal

Emmanuel Dubourg Liberal Bourassa, QC

Thank you.

At one point, you talked about the reliability of the disclosed information that an agency can gather. What did you mean by that?

4:45 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

I guess what we're really talking about is accuracy. There are general provisions right now in the Privacy Act for all government departments that any information they're collecting, using, or disclosing should be reasonably accurate and that they should take steps to ensure that it is.

Our particular concern stems from the tragic case of Maher Arar. From information that turned out to be inaccurate and that may not have been adequately vetted before being handed off to foreign governments, we wound up with a Canadian citizen being detained and tortured, with all kinds of horrible things. That's really the worst-case scenario, and it's a great reason for being really careful with the information we're sharing, particularly when it is being shared with a foreign power.

4:45 p.m.

Liberal

Emmanuel Dubourg Liberal Bourassa, QC

I have one last question, and it's still for you, Mr. Elder.

Do you think there should be records of all the information sharing between those agencies? Also, should parliamentarians have access to those records?

4:45 p.m.

Executive Member, Privacy and Access Law Section, Canadian Bar Association

David Elder

Well, definitely, in accordance with our position, we think those records should definitely exist, because without those records it's very difficult for anybody to have any kind of oversight to check up on exactly how the law is being implemented and what information is being shared.

In terms of access, certainly they should be accessible by whatever oversight body is tasked with that oversight. As to whether they should be generally available to all parliamentarians, I think that is a more difficult question that I'm not sure I can answer now. Obviously there will be puts and takes to that. On the one hand, it will be extremely sensitive information, in many cases. You'd need to have very clear security protocols and clearances and that sort of thing.

4:50 p.m.

Conservative

The Chair Conservative Blaine Calkins

You can come back if we have more time, Mr. Dubourg. We're over the five minutes.

4:50 p.m.

Liberal

Emmanuel Dubourg Liberal Bourassa, QC

It's so quick.